How it Works

A Proof of Concept is readily available for iOS, Android and Windows using two devices: Download the Authen Digital application from the App Store or Google Play to an iPhone or Android Device establishing a user name and password for the accounts without taking the final step to activate the actual Authen Digital protection feature. (For Windows, please email us) Using a second device, attempt to log in to the new account with the newly established credentials of the first (Authen Digital account) device. It will be successful. Then activate the Authen Digital feature on the first device. Authen Digital then performs a scan of the device components and creates an encrypted hash to identify the device. An attempt to log in again with the second device will be denied.. This simulates a hacker in possession of compromised/phished credentials attempting to log in from an unauthorized device. This underlying technology has been penetration tested and is undefeated.

DEMO INSTRUCTIONS

Download the Authen Digital App from the App Store or Google Play.
For Windows please email us.

  • The Authen Digital scans the device components and creates an encrypted hash to identify the device.
  • Establish user accounts and passwords for each. Share the respective credentials, as if they were phished, and attempt to log in to each account with the correct credentials using the incorrect device. This simulates a hacker in possession of compromised/phished credentials attempting to log in from an unauthorized device. Authen Digital will deny access to both devices. This underlying technology has been penetration tested and is undefeated.
  • In one device, create the user account, log in and don’t activate the protection just yet. On another device log in with the same credentials to see how an unprotected account are easy to break in a fishing scenario. Now activate the Authen Digital protection in one device and log out from the another one. Next try to log in again with both devices. Authen Digital will deny access to the unregistered device. This simulates a hacker in possession of compromised/phished credentials attempting to log in from an unauthorized device. This underlying technology has been penetration tested and is undefeated.

DAVA TECH GROUP, INC.

3700 Mansell Road
Alpharetta, GA 30022
United States

Email:
contact@dava-tech.com






International Appointed Reps

Brazil | Japan | Portugal | United Kingdom